Support Services Training
Support Services Training
Perpetrators often use technology to control, stalk, or harass their victims, making it essential for staff to understand these tactics in order to support victims effectively to remain safe and especially not disclose personal and sensitive location information.
Technology abuse must be factored into a victim's safety plan. Staff who are trained in these areas can help victims secure their devices, protect their privacy, and avoid online threats. A well-rounded safety plan that includes digital security can help victims feel safer and more in control.
Sessions are tailored to the attendees' needs and outcomes as required.
Topics may include:
-
Understanding Technology Abuse
-
Where we find tech abuse (GPS trackers, Hidden Cameras etc)
-
Digital Security Basics
-
Location and Privacy Settings
-
Detecting and Removing Spyware
-
Safe Social Media Use
-
Effective Support for Victims
-
Legal and Ethical Considerations
-
Intervention
-
Digital Safety Planning
-
Where to seek further help
-
Documenting Tech Abuse
-
Keeping Up with Technological Advances
-
Childrens Digitel Safety
Explore our various licenses and insurance policies that ensure the highest level of protection for our clients. We are fully accredited and compliant with industry standards.
Protective Group have featured on
Support Services Training may include:
Understanding Modern Tech Abuse Tactics
-
Abusers often exploit technology to extend their control and surveillance over victims. This includes tracking their location through GPS, using spyware, or harassing them via social media and messaging apps. Training ensures staff are aware of these tactics and can recognize when a victim is being digitally abused.
-
Effective Support for Victims
-
Without knowledge of technology abuse, staff may not provide comprehensive support, potentially leaving victims vulnerable to continued control or harassment. Staff need to be able to assist in both emotional and technical aspects, ensuring victims can protect themselves fully.
Safety Planning
-
Technology abuse must be factored into a victim's safety plan. Staff who are trained in these areas can help victims secure their devices, protect their privacy, and avoid online threats. A well-rounded safety plan that includes digital security can help victims feel safer and more in control.
Empowering Victims
-
Training equips staff to educate and empower victims about their own digital safety. Victims often feel helpless in the face of technology abuse, but with proper guidance from staff, they can regain control over their online and technological presence.
Legal and Ethical Considerations
-
Many forms of technology abuse may also be illegal, such as cyberstalking, hacking, and unauthorized surveillance. Staff need to understand how to document these abuses and help victims access legal protections, such as restraining orders that include provisions for digital harassment.
Keeping Up with Technological Advances
-
Technology evolves quickly, and so do the methods of abuse. Training ensures staff stay updated on new tools and strategies abusers may use, as well as on the latest ways to help victims protect themselves.
Forms of Technology Abuse
-
Staff should understand the various ways technology can be used to abuse victims, including:
-
Digital surveillance (e.g., using spyware, hacking into accounts).
-
Harassment and cyberstalking via social media, email, or messaging apps.
-
Location tracking using GPS, mobile apps, or shared family plans.
-
Control over devices (e.g., controlling access to smartphones or computers).
-
Revenge porn and the non-consensual sharing of intimate images.
Assessing for Technology Abuse
-
Staff should be trained on how to screen for signs of technology abuse, such as:
-
Victims receiving threatening messages or being constantly monitored.
-
Devices behaving strangely (e.g., battery draining unusually fast, apps that the victim doesn’t recognize).
-
Victims being aware of things they haven’t shared but the abuser knows (indicating potential spyware).
Digital Safety and Privacy Strategies
-
Securing devices and accounts: Teach victims to secure their devices with strong passwords, enable two-factor authentication (2FA), and be cautious with personal information online.
-
Identifying and removing spyware: Educate staff on how to detect spyware or other monitoring tools on a victim's device and how to safely remove them.
-
Social media privacy: Staff should know how to help victims adjust privacy settings on social media, block abusers, and use reporting mechanisms for harassment or fake accounts.
-
Safety Planning with Technology in Mind
Other Training Courses
Have a Question?
Protective Group are proud to have worked with
NSW Government are a client of Protective Group
Go to linkBenevolent Society are a client of Protective Group
Go to linkVictoria Police engages Protective Group The Orange Door
Go to link